Description
In the Linux kernel, the following vulnerability has been resolved: ptp: ocp: Limit signal/freq counts in summary output functions The debugfs summary output could access uninitialized elements in the freq_in[] and signal_out[] arrays, causing NULL pointer dereferences and triggering a kernel Oops (page_fault_oops). This patch adds u8 fields (nr_freq_in, nr_signal_out) to track the number of initialized elements, with a maximum of 4 per array. The summary output functions are updated to respect these limits, preventing out-of-bounds access and ensuring safe array handling. Widen the label variables because the change confuses GCC about max length of the strings.
Product status
ef61f5528fca6c3bbb2f8bc002fd1949c9d1f9b9 (git) before 0b7d3e782027ac3b6fec56159e8e348042000aef
ef61f5528fca6c3bbb2f8bc002fd1949c9d1f9b9 (git) before fcad74f894ac89790084cc2e1ec61b08220941d1
ef61f5528fca6c3bbb2f8bc002fd1949c9d1f9b9 (git) before c9e455581e2ba87ee38c126e8dc49a424b9df0cf
6.9
Any version before 6.9
6.12.31 (semver)
6.14.9 (semver)
6.15 (original_commit_for_fix)
References
git.kernel.org/...c/0b7d3e782027ac3b6fec56159e8e348042000aef
git.kernel.org/...c/fcad74f894ac89790084cc2e1ec61b08220941d1
git.kernel.org/...c/c9e455581e2ba87ee38c126e8dc49a424b9df0cf
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.